Home

Description

Allok Fast AVI MPEG Splitter 1.2 contains a stack based buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious license name string. Attackers can craft a payload with 780 bytes of junk data followed by structured shellcode and place it in the License Name field to trigger the overflow and execute code with application privileges.

PUBLISHED Reserved 2026-05-17 | Published 2026-05-17 | Updated 2026-05-18 | Assigner VulnCheck




HIGH: 8.6CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
HIGH: 8.4CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

Stack-based Buffer Overflow

Product status

1.2
affected

Credits

Mohan Ravichandran & Velayutham Selvaraj finder

References

www.exploit-db.com/exploits/44341 (ExploitDB-44341) exploit

www.alloksoft.com (Official Product Homepage) product

www.alloksoft.com/allok_vconverter.exe (Product Reference) product

www.vulncheck.com/...eg-splitter-stack-based-buffer-overflow (VulnCheck Advisory: Allok Fast AVI MPEG Splitter 1.2 Stack Based Buffer Overflow) third-party-advisory

cve.org (CVE-2018-25322)

nvd.nist.gov (CVE-2018-25322)

Download JSON